成长值: 63265
|
题目不是很完整,答案仅供参考! Y# @. x6 d9 M) V! U, {0 V
; {5 y- b r2 @+ E C# N- p# z1 cQuestion 01:: L; H& ^! |+ z3 E4 ` Z% i% c
Witch access list entry checks for an ACK within a packet header?7 I0 j4 V( Y5 @+ M* a7 u- l U' P, g
A access-list 49 permit ip any any eq 21 tcp-ack
- Z; C9 R$ _7 [! S& ?B access-list 49 permit tcp any any eq 21 tcp-ack
7 A! Y& M( h8 A. Z$ y" R8 ^2 CC access-list 149 permit tcp any any eq 21 established8 v/ M5 @+ L: [+ j7 J$ m
D access-list 49 permit tcp any any eq 21 established
X) z2 `9 J& d- sAns: C3 _5 T6 K# o7 m# w
———————————————————————————
7 r$ `+ F. `1 S3 N7 D3 iQuestion 02:
9 t7 e) k* U$ s I" kWhich option is one way to mitigate symmetric routing on an active/active firewall setup for TCP-based connections?
- K6 ?4 b) H9 A& Y4 w+ g6 rA performing packet captures5 O i# x4 `2 E
B disabling asr-group commands on interfaces that are likely to receive asymetric traffic
) B% f& v+ N. J, R$ }C replacing them with redundant routers and allowing load balancing
0 ] {2 B$ g$ `+ M* z4 p2 aD disabling stateful TCP checks
. a+ C& A% b" w0 fAns: D; [" `2 h1 I1 o" ?
3 }2 s% n4 _5 V. C8 A( S& y- O) M7 u, Q( a$ E0 ^0 Q1 y( m. P( G9 X( \
|
|